{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:21:01Z","timestamp":1729671661146,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/mobhoc.2009.5337048","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T13:45:43Z","timestamp":1259070343000},"page":"842-847","source":"Crossref","is-referenced-by-count":2,"title":["QoS-aware optimization strategy for security ranking in SSL protocol"],"prefix":"10.1109","author":[{"given":"Fang","family":"Qi","sequence":"first","affiliation":[]},{"family":"Zhe Tang","sequence":"additional","affiliation":[]},{"family":"Guojun Wang","sequence":"additional","affiliation":[]},{"family":"Jie Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"297","article-title":"Quality is in the Eye of the Beholder: Meeting User's Requirements for Internet Quality of Service","author":"bouch","year":"2000","journal-title":"Proceedings of the CHI 2000 conference on Human factors in computing systems"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_34"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00087-6"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"1","first-page":"66","article-title":"Randomness and the Netscape Browser","author":"goldberg","year":"1996","journal-title":"Dr Dobb's Journal"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1128817.1128826","article-title":"Improving Secure Server Performance by Re-balancing SSL\/TLS Handshakes","author":"castelluccia","year":"2006","journal-title":"Proceedings of the 2006 ACM Symposium on Information computer and communications security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.52"},{"year":"0","key":"4"},{"key":"9","first-page":"1","article-title":"Fast Variants of RSA, RSA Laboratories","volume":"5","author":"boneh","year":"2002","journal-title":"CryptoBytes"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052249"}],"event":{"name":"2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS)","start":{"date-parts":[[2009,10,12]]},"location":"Macau, China","end":{"date-parts":[[2009,10,15]]}},"container-title":["2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5312767\/5336910\/05337048.pdf?arnumber=5337048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T15:42:47Z","timestamp":1634226167000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5337048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/mobhoc.2009.5337048","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}